Question No: 521 – (Topic 5)

Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO).

SSH

3DES

AES

SSL

TLS

TKIP

Answer: C,F

Question No: 522 – (Topic 5)

Lisa, a network administrator, wants to be able to block all already known malicious activity. Which of the following would allow her to perform this activity?

Behavioral Based IDS

Signature Based IDS

Behavioral Based IPS

Signature Based IPS

Answer: D

Question No: 523 – (Topic 5)

Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?

Evil twin

War chalking

Buffer overflow

Virus

Answer: A

Question No: 524 – (Topic 5)

An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would MOST likely accomplish this?

Baseline analyzer

Ping

Protocol analyzer

Nessus

Answer: D

Question No: 525 – (Topic 5)

A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?

Stateful inspection

NAT/PAT

Port security

Implicit deny

Answer: D

Question No: 526 – (Topic 5)

Which of the following wireless security measures, although widely implemented, does not provide strong security?

IPSec

WPA2

MAC address filtering

D. 802.1x

Answer: C

Question No: 527 – (Topic 5)

A corporate office recently had a security audit and the IT manager has decided to implement very strict security standards. The following requirements are now in place for each employee logging into the network:

Question No: 528 – (Topic 5)

Which of the following security devices is used in providing packet and MAC address filtering services for the network?

Host-based proxy server

Network-based firewall

IDS

IPS

Answer: B

Question No: 529 – (Topic 5)

Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?

Decreasing radio strength

MAC filtering

WEP encryption

SSID broadcast disable

Answer: A

Question No: 530 – (Topic 5)

Sandy, an administrator, determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?